Section 702 of the Foreign Intelligence Surveillance Act Will Expire Every five or six years, section 702 of FISA expires. Congress continues to do this because it doesn’t trust the government to restrain itself. Section 702 enables limited bulk data surveillance which some constraints on viewing data of Americans vs. foreigners. In case you haven’t […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In light of the most recent Chinese attack on Azure, several people are speaking out. Amit Yoran, chairman of security firm Tenable, former president of RSA and former Homeland Security National Cyber Security Division director, says this in a LinkedIn post: Cloud providers have long espoused the shared responsibility model. That model is irretrievably broken […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Since it seems that fully remote work and hybrid work are not going away anytime soon, we need to make sure that remote workers are secure. It is not going away because the best employees will find another job rather than be forced to come into the office. Forester Research says 68% of remote workers […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the Pentagon grinds agonizingly slowly towards improved cybersecurity with CMMC, the hackers continue to make them look like amateurs. Congress doesn’t seem to be much help in the crisis. Last week the DoD Inspector General crucified the DoD’s operational units for doing a uniformly bad job at protecting Controlled Unclassified Information or CUI. Government […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Criminal or Whistleblower? The hacker behind the Football Leaks scandal, Rui Pinto, a 34 year old Portuguese national, currently faces 377 charges for blowing the lid off the tax fraud, corruption and other wrongdoing in the $3 billion European soccer business. One club alone, Manchester City, faced over 100 counts of financial misconduct as a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Zero Trust is a buzzword these days. People say that it is a key tool in the security practitioner’s arsenal, but what is it anyway. Here is what the core elements are, according to NIST’s zero trust framework. That means those “software functions” in the cloud. Each of them. Each of them is a resource. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]